Sciweavers

597 search results - page 92 / 120
» A Pattern System for Security Requirements Engineering
Sort
View
ECSA
2008
Springer
13 years 9 months ago
Automating Architecture Trade-Off Decision Making through a Complex Multi-attribute Decision Process
A typical software architecture design process requires the architects to make various trade-off architecture decisions. The architects need to consider different possibilities and...
Majid Makki, Ebrahim Bagheri, Ali A. Ghorbani
ANTSW
2010
Springer
13 years 5 months ago
Evaluating the Robustness of Activator-Inhibitor Models for Cluster Head Computation
Activator-inhibitor models have been widely used to explain several morphogenetic processes. They have also been used to engineer algorithms for computer graphics, distributed syst...
Lidia Yamamoto, Daniele Miorandi
SOUPS
2009
ACM
14 years 2 months ago
How users use access control
Existing technologies for file sharing differ widely in the granularity of control they give users over who can access their data; achieving finer-grained control generally requ...
Diana K. Smetters, Nathan Good
SAC
2010
ACM
14 years 2 months ago
TokDoc: a self-healing web application firewall
The growing amount of web-based attacks poses a severe threat to the security of web applications. Signature-based detection techniques increasingly fail to cope with the variety ...
Tammo Krueger, Christian Gehl, Konrad Rieck, Pavel...
EUROSYS
2007
ACM
14 years 4 months ago
Sweeper: a lightweight end-to-end system for defending against fast worms
The vulnerabilities which plague computers cause endless grief to users. Slammer compromised millions of hosts in minutes; a hit-list worm would take under a second. Recently prop...
Joseph Tucek, James Newsome, Shan Lu, Chengdu Huan...